A. AWR baselines are always created as repeating baselines.
B. AWR baselines can be created on the basis of two time values.
C. AWR baselines are always created with infinite expiration duration.
D. AWR baselines are always created using the Automatic Workload Repository (AWR) retention period as expiration duration.
您可能感兴趣的试卷
你可能感兴趣的试题
A. ASMB
B. PMON
C. RBAL
D.SMON
You discover that your Recycle Bin contains two tables with the same name, MY_TABLE. You also have a table named MY_TABLE in your schema.You execute the following statement:
FLASHBACK TABLE my_table TO BEFORE DROP RENAME TO my_table2;
What will be the result of executing this statement?()
A. One of the tables is recovered from the Recycle Bin using a First In First Out (FIFO) approach.
B.One of the tables is recovered from the Recycle Bin using a Last In First Out (LIFO) approach.
C. Both the tables are recovered from the Recycle Bin with one table renamed to MY_TABLE2 and the other to a system-generated name.
D. None of the tables are recovered from the Recycle Bin, and the statement returns an error.
Following is the list of locations in random order where oranfstab can be placed.
1./etc/mtab
2.$ORACLE_HOME/dbs/oranfstab
3./etc/oranfstab
What is the sequence in which Direct NFS will search the locations?()
A. 1, 2, 3
B. 3, 2, 1
C. 2, 3, 1
D. 1, 3, 2
Evaluate the following function code:
Which statement is true regarding the above function? ()
A. The cached result becomes invalid when any structural change is done to the EMPLOYEES table.
B. If the function execution results in an unhandled exception, the exception result is also stored in the cache.
C. Each time the function is invoked in a different session, the current result in the result cache gets overwritten.
D. If the function is invoked with a different parameter value, the existing result in the result cache gets overwritten by the latest value.
A. The BZIP2 compression algorithm consumes more CPU resources than the ZLIB compression algorithm.
B. The ZLIB compression algorithm consumes more CPU resources than the BZIP2 compression algorithm.
C. The ZLIB compression algorithm provides maximum compression and produces smaller backups than the BZIP2 compression algorithm.
D. Only the BZIP2 compression algorithm can be used to make compressed backups to disk.
You have the following requirements in relation to the detection of block corruption for your database instance:
1. Check for logical self-consistency of data blocks when modified in memory.
2. Checksums are calculated before and after the block change.
3. Checks are performed for the lost writes to the physical standby database.
Which method would help you perform the above checks automatically? ()
A. Set the DB_SECUREFILE parameter to PERMITTED
B. Set the DB_ULTRA_SAFE parameter to DATA_ONLY
C. Set the DB_LOCK_CHECKSUM parameter to TYPICAL
D. Set the DB_LOST_WRITE_PROTECT parameter to TYPICAL
To control the execution of a server process when it is receiving bad packets from a potentially malicious client, you set the SEC_PROTOCOL_ERROR_FURTHER_ACTION initialization parameter as follows:
SQL> ALTER SYSTEM SET SEC_PROTOCOL_ERROR_FURTHER_ACTION = Drop,10;
What is the significance of this setting?()
A. It terminates the client connection after 10 bad packets and the client cannot reconnect to the same instance.
B. It terminates the client connection after 10 bad packets but the client can still reconnect, and attempt the same operation again.
C. It terminates the client connection 10 seconds after receiving a bad packet and the client cannot reconnect to the same instance.
D. It terminates the client connection after receiving a bad packet and the client can reconnect to the same instance after 10 minutes.
Examine the following command:
ALTER DISKGROUP data MOUNT FORCE;
In which scenario can you use the above command to mount the disk group? ()
A. when ASM disk goes offline
B. when one or more ASM files are dropped
C. when some disks in a disk group are offline
D. when some disks in a failure group for a disk group are rebalancing
A. If the lost redo log group is ACTIVE, you should first attempt to clear the log file.
B. If the lost redo log group is CURRENT, you must clear the log file.
C. If the lost redo log group is ACTIVE, you must restore, perform cancel-based incomplete recovery, and open the database using the RESETLOGS option.
D. If the lost redo log group is CURRENT, you must restore, perform cancel-based incomplete recovery, and open the database using the RESETLOGS option.
You issue the following command on the RMAN prompt.
REPORT NEED BACKUP DAYS 5;
Which statement is true about executing this command?()
A. It will display a list of files that need incremental backup
B. It will display a list of files that need backup after five days
C. It will display a list of files that were backed up in the last five days
D. It will display a list of files that have not been backed up in the last five days
E. It will apply the current retention policy to determine the files that need to be backed up
最新试题
After you have restored and recovered a database to a new host by using a previously performed Recovery Manager (RMAN) backup, which is the best option you would consider for the new database?()
In your production database, users report that they are unable to generate reports on an important table because it does not contain any data. While investigating the reason, you realize that another user executed the TRUNCATE TABLE command, which accidentally caused the data to be lost. Now you want to recover the lost data of the table without affecting objects in other schemas.Which method must you use to recover the lost data?()
The user SYS creates a job by using the following command:Which two statements are true about the job that was created by the preceding command?()
You executed the following commands in a database session:What could have caused the recycle bin to clean up?()
View the Exhibit and examine the output.You execute the following RMAN command to perform the backup operation:What is the multiplexing level in the preceding backup process()
Which two operations are NOT performed by the DUPLICATE command in Recovery Manager (RMAN)while duplicating a running database?()
Examine the parameter setting in your database:Which statement is correct about the database?()
The BACKUP_TAPE_IO_SLAVES parameter is set to FALSE for the database instance. Which statement is true while performing a tape backup in an RMAN session?()
You are working in an online transaction processing (OLTP) environment. You use the FLASHBACKTABLE command to flash back the CUSTOMERS table. Before executing the FLASHBACK TABLE command, the system change number (SCN) was 663571. After flashing back the CUSTOMERS table, you realize that the table is not in the correct state. Now, you need to reverse the effects of the FLASHBACK TABLE command.Which is the fastest and the most efficient option to reverse the effects of the FLASHBACK TABLE command?()
Examine the following RMAN script:Which statement describes the purpose of the script?()