1Z0-062 | The Secret of Oracle 1Z0-062 exam


Q41. In your Database, the TBS PERCENT USED parameter is set to 60 and the TBS PERCENT FREE parameter is set to 20. 

Which two storage-tiering actions might be automated when using information Lifecycle Management (ILM) to automate data movement? 

A. The movement of all segments to a target tablespace with a higher degree of compression, on a different storage tier, when the source tablespace exceeds TBS PERCENT USED 

B. Setting the target tablespace to read-only 

C. The movement of some segments to a target tablespace with a higher degree of compression, on a different storage tier, when the source tablespace exceeds TBS PERCENT USED 

D. Setting the target tablespace offline E. The movement of some blocks to a target tablespace with a lower degree of compression, on a different storage tier, when the source tablespace exceeds TBS PERCENT USED 

Answer: B,C 

Explanation: 

The value for TBS_PERCENT_USED specifies the percentage of the tablespace quota when a tablespace is considered full. The value for TBS_PERCENT_FREE specifies the targeted free percentage for the tablespace. When the percentage of the tablespace quota reaches the value of TBS_PERCENT_USED, ADO begins to move data so that percent free of the tablespace quota approaches the value of TBS_PERCENT_FREE. This action by ADO is a best effort and not a guarantee. 

Q42. You plan to implement the distributed database system in your company. You invoke Database Configuration Assistant (DBCA) to create a database on the server. During the installation, DBCA prompts you to specify the Global Database Name. 

What must this name be made up of? 

A. It must be made up of a database name and a domain name. 

B. It must be made up of the value in ORACLE_SID and HOSTNAME. 

C. It must be made up of the value that you plan to assign for INSTANCE_NAME and HOSTNAME. 

D. It must be made up of the value that you plan to assign for ORACLE_SID and SERVICE_NAMES. 

Answer:

Explanation: Using the DBCA to Create a Database (continued) 

3. Database Identification: Enter the Global Database Name in The form database_name.domain_name, and the system identifier (SID). The SID defaults lo the database name and uniquely identifies the instance associated with the database. 

4. Management Options: Use this page to set up your database so that it can be managed with Oracle Enterprise Manager. Select the default: "Configure the Database with Enterprise Manager." Optionally, this page allows you to configure alert notifications and daily disk backup area settings. 

Note: Yon must configure the listener before you can configure Enterprise Manager (as shown earlier). 

Q43. You executed this command to create a password file: 

$ orapwd file = orapworcl entries = 10 ignorecase = N 

Which two statements are true about the password file? 

A. It will permit the use of uppercase passwords for database users who have been granted the SYSOPER role. 

B. It contains username and passwords of database users who are members of the OSOPER operating system group. 

C. It contains usernames and passwords of database users who are members of the OSDBA operating system group. 

D. It will permit the use of lowercase passwords for database users who have granted the SYSDBA role. 

E. It will not permit the use of mixed case passwords for the database users who have been granted the SYSDBA role. 

Answer: A,D 

Explanation: * You can create a password file using the password file creation utility, ORAPWD. 

* Adding Users to a Password File 

When you grant SYSDBA or SYSOPER privileges to a user, that user's name and privilege information are added to the password file. If the server does not have an EXCLUSIVE 

password file (that is, if the initialization parameter REMOTE_LOGIN_PASSWORDFILE is NONE or SHARED, or the password file is missing), Oracle Database issues an error if you attempt to grant these privileges. 

A user's name remains in the password file only as long as that user has at least one of these two privileges. If you revoke both of these privileges, Oracle Database removes the user from the password file. 

* The syntax of the ORAPWD command is as follows: 

ORAPWD FILE=filename [ENTRIES=numusers] [FORCE={Y|N}] [IGNORECASE={Y|N}] [NOSYSDBA={Y|N}] 

* IGNORECASE If this argument is set to y, passwords are case-insensitive. That is, case is ignored when comparing the password that the user supplies during login with the password in the password file. 

Q44. Which three tasks can be automatically performed by the Automatic Data Optimization feature of Information lifecycle Management (ILM)? 

A. Tracking the most recent read time for a table segment in a user tablespace 

B. Tracking the most recent write time for a table segment in a user tablespace 

C. Tracking insert time by row for table rows 

D. Tracking the most recent write time for a table block 

E. Tracking the most recent read time for a table segment in the SYSAUX tablespace 

F. Tracking the most recent write time for a table segment in the SYSAUX tablespace 

Answer: A,B,D 

Explanation: 

Incorrect: 

Not E, Not F When Heat Map is enabled, all accesses are tracked by the in-memory activity tracking module. Objects in the SYSTEM and SYSAUX tablespaces are not tracked. 

* To implement your ILM strategy, you can use Heat Map in Oracle Database to track data access and modification. 

Heat Map provides data access tracking at the segment-level and data modification tracking at the segment and row level. 

* To implement your ILM strategy, you can use Heat Map in Oracle Database to track data access and modification. You can also use Automatic Data Optimization (ADO) to automate the compression and movement of data between different tiers of storage within the database. Reference: Automatic Data Optimization with Oracle Database 12c with Oracle Database 12c 

Q45. Which statement is true about Enterprise Manager (EM) express in Oracle Database 12c? 

A. By default, EM express is available for a database after database creation. 

B. You can use EM express to manage multiple databases running on the same server. 

C. You can perform basic administrative tasks for pluggable databases by using the EM express interface. 

D. You cannot start up or shut down a database Instance by using EM express. 

E. You can create and configure pluggable databases by using EM express. 

Answer:

Explanation: EM Express is built inside the database. 

Note: Oracle Enterprise Manager Database Express (EM Express) is a web-based database management tool that is built inside the Oracle Database. It supports key performance management and basic database administration functions. From an architectural perspective, EM Express has no mid-tier or middleware components, ensuring that its overhead on the database server is negligible. 

Q46. To enable the Database Smart Flash Cache, you configure the following parameters: 

DB_FLASH_CACHE_FILE = ‘/dev/flash_device_1’ , ‘/dev/flash_device_2’ 

DB_FLASH_CACHE_SIZE=64G 

What is the result when you start up the database instance? 

A. It results in an error because these parameter settings are invalid. 

B. One 64G flash cache file will be used. 

C. Two 64G flash cache files will be used. 

D. Two 32G flash cache files will be used. 

Answer:

Q47. Examine the following command; 

ALTER SYSTEM SET enable_ddl_logging = TRUE; 

Which statement is true? 

A. Only the data definition language (DDL) commands that resulted in errors are logged in the alert log file. 

B. All DDL commands are logged in the alert log file. 

C. All DDL commands are logged in a different log file that contains DDL statements and their execution dates. 

D. Only DDL commands that resulted in the creation of new segments are logged. 

E. All DDL commands are logged in XML format in the alert directory under the Automatic Diagnostic Repository (ADR) home. 

Answer:

Explanation: Once DDL logging is turned on, every DDL command will be logged in the alert log file and also the log.xml file. 

Note: 

* By default Oracle database does not log any DDL operations performed by any user. The default settings for auditing only logs DML operations. 

* Oracle 12c DDL Logging – ENABLE_DDL_LOGGING 

The first method is by using the enabling a DDL logging feature built into the database. By default it is turned off and you can turn it on by setting the value of ENABLE_DDL_LOGGING initialization parameter to true. 

* We can turn it on using the following command. The parameter is dynamic and you can 

turn it on/off on the go. 

SQL> alter system set ENABLE_DDL_LOGGING=true; 

System altered. Elapsed: 00:00:00.05 SQL> 

Once it is turned on, every DDL command will be logged in the alert log file and also the log.xml file. 

Q48. Which three statements are true about Flashback Database? 

A. Flashback logs are written sequentially, and are archived. 

B. Flashback Database uses a restored control file to recover a database. 

C. The Oracle database automatically creates, deletes, and resides flashback logs in the Fast Recovery Area. 

D. Flashback Database can recover a database to the state that it was in before a reset logs operation. 

E. Flashback Database can recover a data file that was dropped during the span of time of the flashback. 

F. Flashback logs are used to restore to the blocks' before images, and then the redo data may be used to roll forward to the desired flashback time. 

Answer: B,C,F 

Explanation: * Flashback Database uses its own logging mechanism, creating flashback logs and storing them in the fast recovery area (C). You can only use Flashback Database if flashback logs are available. To take advantage of this feature, you must set up your database in advance to create flashback logs. 

* To enable Flashback Database, you configure a fast recovery area and set a flashback retention target. This retention target specifies how far back you can rewind a database with Flashback Database. 

From that time onwards, at regular intervals, the database copies images of each altered block in every data file into the flashback logs. These block images can later be reused to reconstruct the data file contents for any moment at which logs were captured. (F) 

Incorrect: Not E: You cannot use Flashback Database alone to retrieve a dropped data file. If you flash back a database to a time when a dropped data file existed in the database, only the data file entry is added to the control file. You can only recover the dropped data file by using RMAN to fully restore and recover the data file. 

Reference: Oracle Database Backup and Recovery User's Guide 12c R 

Q49. You must track all transactions that modify certain tables in the sales schema for at least three years. 

Automatic undo management is enabled for the database with a retention of one day. 

Which two must you do to track the transactions? 

A. Enable supplemental logging for the database. 

B. Specify undo retention guarantee for the database. 

C. Create a Flashback Data Archive in the tablespace where the tables are stored. 

D. Create a Flashback Data Archive in any suitable tablespace. 

E. Enable Flashback Data Archiving for the tables that require tracking. 

Answer: D,E 

Explanation: E: By default, flashback archiving is disabled for any table. You can enable flashback archiving for a table if you have the FLASHBACK ARCHIVE object privilege on the Flashback Data Archive that you want to use for that table. 

D: Creating a Flashback Data Archive 

/ Create a Flashback Data Archive with the CREATE FLASHBACK ARCHIVE statement, specifying the following: 

Name of the Flashback Data Archive 

Name of the first tablespace of the Flashback Data Archive 

(Optional) Maximum amount of space that the Flashback Data Archive can use in the first tablespace 

/ Create a Flashback Data Archive named fla2 that uses tablespace tbs2, whose data will be retained for two years: 

CREATE FLASHBACK ARCHIVE fla2 TABLESPACE tbs2 RETENTION 2 YEAR; 

Q50. In your multitenant container database (CDB) containing pluggable database (PDBs), the 

HR user executes the following commands to create and grant privileges on a procedure: 

CREATE OR REPLACE PROCEDURE create_test_v (v_emp_id NUMBER, v_ename VARCHAR2, v_SALARY NUMBER, v_dept_id NUMBER) 

BEGIN 

INSERT INTO hr.test VALUES (V_emp_id, V_ename, V_salary, V_dept_id); 

END; 

GRANT EXECUTE ON CREATE_TEST TO john, jim, smith, king; 

How can you prevent users having the EXECUTE privilege on the CREATE_TEST procedure from inserting values into tables on which they do not have any privileges? 

A. Create the CREATE_TEST procedure with definer’s rights. 

B. Grant the EXECUTE privilege to users with GRANT OPTION on the CREATE_TEST procedure. 

C. Create the CREATE_TEST procedure with invoker’s rights. 

D. Create the CREATE_TEST procedure as part of a package and grant users the EXECUTE privilege the package. 

Answer:

Explanation: If a program unit does not need to be executed with the escalated privileges of the definer, you should specify that the program unit executes with the privileges of the caller, also known as the invoker. Invoker's rights can mitigate the risk of SQL injection. 

Incorrect: 

Not A: By default, stored procedures and SQL methods execute with the privileges of their owner, not their current user. Such definer-rights subprograms are bound to the schema in which they reside. 

not B: Using the GRANT option, a user can grant an Object privilege to another user or to PUBLIC.