1z0-060 | The Secret of Oracle 1z0-060 vce


Q1. Examine these two statements:

Which three are true about the MRKT tablespace?

A. The MRKT tablespace is created as a small file tablespace, because the file size is less than the minimum required for big file files.

B. The MRKT tablespace may be dropped if it has no contents.

C. Users who were using the old default tablespace will have their default tablespaces changed to the MRKT tablespace.

D. No more data files can be added to the tablespace.

E. The relative file number of the tablespace is not stored in rowids for the table rows that are stored in the MRKT tablespace.

Answer: CDE

Q2. Which two statements are true about Oracle Managed Files (OMF)?

A. OMF cannot be used in a database that already has data files created with user- specified directions.

B. The file system directions that are specified by OMF parameters are created automatically.

C. OMF can be used with ASM disk groups, as well as with raw devices, for better file management.

D. OMF automatically creates unique file names for table spaces and control files.

E. OMF may affect the location of the redo log files and archived log files.

Answer: DE

Q3. You notice a performance change in your production Oracle database and you want to know which change has made this performance difference.

You generate the Compare Period Automatic Database Diagnostic Monitor (ADDM) report to further investigation.

Which three findings would you get from the report?

A. It detects any configuration change that caused a performance difference in both time periods.

B. It identifies any workload change that caused a performance difference in both time periods.

C. It detects the top wait events causing performance degradation.

D. It shows the resource usage for CPU, memory, and I/O in both time periods.

E. It shows the difference in the size of memory pools in both time periods.

F. It gives information about statistics collection in both time periods.

Answer: ABD

Q4. Which two are true concerning a multitenant container database with three pluggable database?

A. All administration tasks must be done to a specific pluggable database.

B. The pluggable databases increase patching time.

C. The pluggable databases reduce administration effort.

D. The pluggable databases are patched together.

E. Pluggable databases are only used for database consolidation.

Answer: CE

Q5. You notice that the performance of your production 24/7 Oracle database significantly degradeD.  Sometimes you are not able to connect to the instance because it hangs. You do not want to restart the database instance.

How can you detect the cause of the degraded performance?

A. Enable Memory Access Mode, which reads performance data from SGA. 

B. Use emergency monitoring to fetch data directly from SGA analysis.

C. Run Automatic Database Diagnostic Monitor (ADDM) to fetch information from the latest Automatic Workload Repository (AWR) snapshots.

D. Use Active Session History (ASH) data and hang analysis in regular performance monitoring.

E. Run ADDM in diagnostic mode.

Answer: B

Q6. Which three statements are true about the working of system privileges in a multitenant control database (CDB) that has pluggable databases (PDBs)?

A. System privileges apply only to the PDB in which they are used. 

B. Local users cannot use local system privileges on the schema of a common user.

C. The granter of system privileges must possess the set container privilege.

D. Common users connected to a PDB can exercise privileges across other PDBs.

E. System privileges with the with grant option container all clause must be granted to a common user before the common user can grant privileges to other users.

Answer: ACE

Q7. In which two scenarios do you use SQL* Loader to load data?

A. Transform the data while it is being loaded into the database.

B. Use transparent parallel processing without having to split the external data first.

C. Load data into multiple tables during the same load statement.

D. Generate unique sequential key values in specified columns.

Answer: CD

Q8. In your Database, the TBS PERCENT USED parameter is set to 60 and the TBS PERCENT FREE parameter is set to 20.

Which two storage-tiering actions might be automated when using information Lifecycle Management (ILM) to automate data movement?

A. The movement of all segments to a target tablespace with a higher degree of compression, on a different storage tier, when the source tablespace exceeds TBS PERCENT USED

B. Setting the target tablespace to read-only

C. The movement of some segments to a target tablespace with a higher degree of compression, on a different storage tier, when the source tablespace exceeds TBS PERCENT USED

D. Setting the target tablespace offline

E. The movement of some blocks to a target tablespace with a lower degree of compression, on a different storage tier, when the source tablespace exceeds TBS PERCENT USED

Answer: BC

Q9. You use a recovery catalog for maintaining your database backups.

You execute the following command:

$rman TARGET / CATALOG rman / cat@catdb

RMAN > BACKUP VALIDATE DATABASE ARCHIVELOG ALL;

Which two statements are true?

A. Corrupted blocks, if any, are repaired. 

B. Checks are performed for physical corruptions.

C. Checks are performed for logical corruptions.

D. Checks are performed to confirm whether all database files exist in correct locations

E. Backup sets containing both data files and archive logs are created. 

Answer: BD

Q10. Examine the following commands for redefining a table with Virtual Private Database (VPD) policies:

Which two statements are true about redefining the table?

A. All the triggers for the table are disabled without changing any of the column names or column types in the table.

B. The primary key constraint on the EMPLOYEES table is disabled during redefinition.

C. VPD policies are copied from the original table to the new table during online redefinition.

D. You must copy the VPD policies manually from the original table to the new table during online redefinition.

Answer: AC