Q1. You want to create a role to meet these requirements:
1. The role is to be protected from unauthorized usage.
2. The password of the role is not to be embedded in the application source code or stored in a table.
Which method would you use to restrict enabling of such roles?
A. Create the role with external authentication. B.
Create the role as a secure application role. C.
Create the role as a password-protected role.
D. Create a role and use Fine-Grained Access Control (FGAC) to secure the role.
Answer: B
Q2. You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions.
You also plan to transfer these values to another table for analysis. How would you achieve this?
A. by using triggers
B. by using Data Pump
C. by using external tables
D. by using anonymous PL/SQL blocks
Answer: A
Q3. Why does performance degrade when many UPDATE, INSERT or DELETE statements are issued on a table that has an associated bitmap index?
A. The DML operations re-create the bitmap index blocks
B. The bitmap index is rebuilt automatically after a DML operation
C. The smallest amount of a bitmap that can be locked is a bitmap segment
D. Additional time is taken to remove NULL values from the bitmap index after a DML operation
Answer: C
Q4. In which situation may the UNDO_RETENTION parameter be ignored, even if it is set to a value?
A. When the data file of the undo tablespace is autoextensible
B. When there are more than one undo tablespace available in the database
C. When the undo tablespace is of a fixed size and retention guarantee is not enabled
D. When the undo tablespace is autoextensible and retention guarantee is not enabled
Answer: C
Q5. You configured the Flash Recovery Area for your database. The database instance has been started in ARCHIVELOG mode and the LOG_ARCHIVE_DEST_1 parameter is not set.
What will be the implications on the archiving and the location of archive redo log files?
A. Archiving will be disabled because the destination for the redo log files is missing
B. The database instance will shut down and the error details will be logged in the alert log file
C. Archiving will be enabled and the destination for the archived redo log file will be set to the Flash Recovery Area implicitly
D. Archiving will be enabled and the location for the archive redo log file will be created in the default location $ORACLE_HOME/log
Answer: C
Q6. You plan to implement the distributed database system in your company. You invoke Database Configuration Assistant (DBCA) to create a database on the server. During the installation, DBCA prompts you to specify the Global Database Name.
What must this name be made up of?
A. It must be made up of a database name and a domain name.
B. It must be made up of the value in ORACLE_SID and HOSTNAME.
C. It must be made up of the value that you plan to assign for INSTANCE_NAME and HOSTNAME.
D. It must be made up of the value that you plan to assign for ORACLE_SID and SERVICE_NAMES.
Answer: A
Q7. Identify the logical structure that will never have more than one data segment created for it.
A. external table
B. partitioned table
C. partitioned index
D. nonclustered table
E. global temporary table
Answer: D
Q8. View the Exhibit. What would happen if Oracle Home is not empty?
A. The installation will not be continued until the location is empty.
B. The installation will proceed without overwriting the existing files.
C. The installation can be continued, but the existing files will be overwritten.
D. The installation terminates automatically after showing an error message.
Answer: A
Q9. Which two statements are true about the Automatic Workload Repository (AWR)? (Choose two.)
A. All AWR tables belong to the SYSTEM schema
B. The AWR contains systemwide tracing and logging information
C. The snapshots collected by the AWR are accessible through data dictionary views
D. The snapshots collected by the AWR are used by self-tuning components in the database
Answer: CD
Q10. Which three descriptions are correct about the effects of the TRUNCATE command on a table?
(Choose three.)
A. The corresponding indexes for the table are also truncated.
B. Delete triggers on the table are fired during the execution of the TRUNCATE command.
C. The child table is truncated when the TRUNCATE command is applied on the parent table.
D. The highwater mark (HWM) is set to point to the first usable data block in the table segment.
E. No undo or very little undo data is generated during the execution of the TRUNCATE command.
Answer: ADE