Actual of 1z0-034 exam question materials and practice for Oracle certification for consumer, Real Success Guaranteed with Updated 1z0-034 pdf dumps vce Materials. 100% PASS Upgrade Oracle9i/10g OCA to Oracle Database 11g OCP exam Today!
2016 Jun 1z0-034 Study Guide Questions:
Q1. You are managing an Oracle Database 11g ASM instance with a disk group dg01 having three disks.
One of the disks in the disk group becomes unavailable because of power failure. You issued the following command to change the DISK_REPAIR_TIME attribute from 3.6 hours to 5 hours:
ALTER DISKGROUP dg01 SET ATTRIBUTE *disk_repair_time' = '5h'
To which disks in the disk group will the new value be applicable?
A. all disks in the disk group
B. all disks that are currently in OFFLINE mode
C. all disks that are not currently in OFFLINE mode
D. all disks in the disk group only if all of them are ONLINE
Check out the answer options, it is tricky. The NOT OFFLINE disks equals ONLINE disks. Refer to Set the DISK_REPAIR_TIME Disk Group Attribute Appropriately. The DISK_REPAIR_TIME disk group attribute specifies how long a disk remains offline before Oracle ASM drops the disk. If a disk is made available before the DISK_REPAIR_TIME parameter has expired, the storage administrator can issue the ONLINE DISK command and Oracle ASM resynchronizes the stale data from the mirror side. In Oracle Database 11g, the online disk operation does not restart if there is a failure of the instance on which the disk is running. You must reissue the command manually to bring the disk online.
Q2. Identify two options that Oracle recommends while configuring the backup and recovery environment for your recovery catalog. (Choose two.)
A. configuring control file autobackup to be ON
B. backing up data filed only and not the archived redo log files
C. running the recovery catalog database in NOARCHIVELOG mode.
D. setting the retention policy to a REDUNDANCY value greater than 1
E. backing up the recovery catalog to the same disk as that of the target database
Refer to here.
Configuring the Recovery Catalog Database
When you use a recovery catalog, RMAN requires that you maintain a recovery catalog schema.
The recovery catalog is stored in the default tablespace of the schema. The SYS user cannot be the owner of the recovery catalog.
Decide which database you will use to install the recovery catalog schema, and also how you will back up this database. Also, decide whether to operate the catalog database in ARCHIVELOG mode, which is recommended.
Note: Do not use the target database to be backed up as the database for the recovery catalog.
The recovery catalog must be protected if the target database is lost.
Q3. You need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package.
Which statement is true regarding the ACL created?
A. It is a list of remote database links stored in the XML file that are available to the users of the database.
B. It is a list of users and network privileges stored in the XML file according to which a group of users canconnect to one or more hosts.
C. It is a list of users and network privileges stored in the data dictionary according to which a group of userscan connect to one or more hosts.
D. It is the list of the host names or the IP addresses stored in the data dictionary that can connect to yourdatabase through PL/SQL network utility packages such as UTL_TCP.
The DBMS_NETWORK_ACL_ADMIN package provides the interface to administer the network Access ControlList (ACL). Refer to here for About Fin-Grained Access to External Network ServicesConfiguring fine-grained access control for users and roles that need to access external network services fromthe database. This way, specific groups of users can connect to one or more host computers, based onprivileges that you grant them. Typically, you use this feature to control access to applications that run onspecific host addresses. To configure fine-grained access control to external network services, you create an access control list (ACL),which is stored in Oracle XML DB. You can create the access control list by using Oracle XML DB itself, orby using the DBMS_NETWORK_ACL_ADMIN and DBMS_NETWORK_ACL_UTILITY PL/SQL packages. This guideexplains how to use these packages to create and manage the access control list. To create an access controllist by using Oracle XML DB and for general conceptual information about access control lists, see Oracle XMLDB Developer's Guide.
Renewal oca 1z0-052 dumps:
Q4. Because of a logical corruption in your production database, you wanted to perform Tablespace Point in TimeRecovery (TSPITR). But before you start the recovery, you queried the TS_PITR_OBJECTS_TO_BE_DROPPEDview and realized that there are a large number of objects that would be dropped when you start the recoveryby using this method. You want to preserve these objects. Which option must you use to perform TSPITR andpreserve the object?
A. Perform Export before TSPITR and Import after TSPITR
B. Move objects to another schema that has the same tablespace assigned
C. Perform Incomplete Recovery before TSPITR with the Log Sequence Number (LSN)
D. Perform Incomplete Recovery before TSPITR with the System Change Number (SCN)
Q5. While exporting data with Data Pump, you find that the export takes longer than expected. You decide to stop the job and restart it during off-peak hours.
Which view would you query to determine the name and status of the stopped job?
When a Datapump Export or Import session is launched, a Datapump Job is automatically tarted. This way, we can:* detach from and reattach to long-running jobs without affecting the job itself.
* monitor jobs from multiple locations
* stop a job: suspend it temporarily to leave other applications requesting more resources to get them restart itlater
* kill any Datapump job anytime
* see the progress of the import or export operations
REF.: Metalink Note: 262557.1
Q6. What is the effect of increasing the value of the ASM_POWER_LIMIT parameter?
A. The number of DBWR processes increases
B. The number of ASMB processes increases
C. The number of DBWR_TO_SLAVES increases
D. The rebalancing operation in an ASM instance completes more quickly, but can result in higher I/Ooverhead
Breathing 1z0-052 pdf:
Q7. Examine these Data Pump commands to import objects to non-existent users hr1 and oe1.
S expdp system/manager Schemas =hr,oe directory =EXP_ DIR include = table
$ impdp system/manager Schemas = hr1,oe1 Directory = EXP_DIR Dumpfile = export.dat Remap_schema =hr:hr1,oe :oe1
What would be achieved by running the above commands?
A. expdp will fail because no path has been defined for the dumpfile.
B. expdp will succeed but Impdp will fail because users do not exist.
C. impdp will create two users called hrl and oe1 and import all objects to the new schemas
D. impdp will create two users called hrl and oe1 and import tables owned by hr and oe schemas to hr1 and oe1 schemas, respectively.
Q8. You execute the following command to set the redundancy retention policy in Recovery Manager (RMAN):
RMAN> CONFIGURE RETENTION POLICY TO REDUNDANCY 3;
Identify the statement that correctly describes the implications of this command.
A. when there are already three backups, for the fourth backup RMAN removes the oldest backup.
B. When there are already three backups, for the fourth backup RMAN marks the oldest backup as obsolete.
C. the number of backups that are retained is equal to three and it includes full, incremental, and cumulativebackups.
D. when there are already three backup, one of the existing backups must be removed manually before takingthe fourth backup.
Configuring a Redundancy-Based Retention Policy The REDUNDANCY parameter of the CONFIGURE RETENTION POLICY command specifies how many full or level 0 backups of each data file and control file that RMAN should keep. If the number of full or level 0backups for a specific data file or control file exceeds the REDUNDANCY setting, then RMAN considers the extra backups as obsolete. The default retention policy is REDUNDANCY 1. As you produce more backups, RMAN keeps track of which ones to retain and which are obsolete. RMAN retains all archived logs and incremental backups that are needed to recover the non obsolete backups. Assume that you make a full backup of data file 7 on Monday, Tuesday, Wednesday, and Thursday. You now have four full backups of this data file. If REDUNDANCY is 2, then the Monday and Tuesday backups are obsolete. If you make another backup on Friday, then the Wednesday backup of data file 7 becomes obsolete. Assume a different case in which REDUNDANCY is 1. You run a level 0 database backup at noon on Monday, a level 1 cumulative backup at noon on Tuesday and Wednesday, and a level 0 backup at noon on Thursday. Immediately after each daily backup you run the command DELETE OBSOLETE. The Wednesday DELETE command does not remove the Tuesday level 1 backup because this backup is not redundant: the Tuesday level 1 backup could be used to recover the Monday level 0 backup to a time between noon on Tuesday and noon on Wednesday. However, the DELETE command on Thursday removes the previous level 0 and level 1backups. Run the CONFIGURE RETENTION POLICY command at the RMAN prompt, as in the following example: CONFIGURE RETENTION POLICY TO REDUNDANCY 3;
Q9. The database is configured in ARCHIEVELOG mode and regular complete database backups are taken. The loss of which two types of files may require a recovery with the RESETLOGS option?
A. Control files
B. Password file
C. Inactive online redo log file
D. Archived log files required to perform recovery
E. Newly created tablespace which is not backed up
The RESETLOGS options is required in:
1. Imcomplete Recovery
2. Change of control file
So that, the control file and archived redo logs are required.
Q10. The instance abnormally terminates because of a power outage. Which statement is true about redo log files during instance recovery?
A. Inactive and current redo log files are required to accomplish recovery
B. Online and archived redo files are required to accomplish instance recovery
C. All redo log entries after the last checkpoint are applied from redo log files to data files
D. All redo log entries recorded in the current log file until the checkpoint position are applied to data files