Examine the following command used to perform incremental level 0 backup: RMAN BACKUP INCREMENTAL LEVEL 0 DATABASE; To enable the block change tracking, after the incremental level 0 backup you issued the following command: SQL ALTER DATABASE ENABLE BLOCK CHANGE TRACKING USING FILE '/mydir/ rman_change_track.f'; To perform incremental level 1 cumulative backup, you issued the following command: RMAN BACKUP INCREMENTAL LEVEL 1 CUMULATIVE DATABASE; Which two statements are true in the above situation?()A、The block change tracking data will be used only from the next incremental 0 backup.B、The incremental backup will use change tracking data for accomplishing the backup.C、The incremental backup will not use change tracking data for accomplishing the backup.D、The block track file will scan all the blocks and create bitmap for all the blocks backed up in the level 0 backup.

Examine the following command used to perform incremental level 0 backup: RMAN> BACKUP INCREMENTAL LEVEL 0 DATABASE; To enable the block change tracking, after the incremental level 0 backup you issued the following command: SQL> ALTER DATABASE ENABLE BLOCK CHANGE TRACKING USING FILE '/mydir/ rman_change_track.f'; To perform incremental level 1 cumulative backup, you issued the following command: RMAN> BACKUP INCREMENTAL LEVEL 1 CUMULATIVE DATABASE; Which two statements are true in the above situation?()

  • A、The block change tracking data will be used only from the next incremental 0 backup.
  • B、The incremental backup will use change tracking data for accomplishing the backup.
  • C、The incremental backup will not use change tracking data for accomplishing the backup.
  • D、The block track file will scan all the blocks and create bitmap for all the blocks backed up in the level 0 backup.

相关考题:

Examine the following RMAN command:RMAN CONFIGURE ENCRYPTION FOR DATABASE ON;RMAN BACKUP DATABASE PLUS ARCHIVELOG;Which prerequisite must be met before accomplishing the backup?() A. Provide a password for the encryptionB. Set up an Oracle wallet for the encryptionC. No setup is required as it is a default encryption methodD. Both Oracle wallet and password must be set up for the encryption

View the Exhibit and examine the output.You execute the following RMAN command to perform the backup operation:What is the multiplexing level in the preceding backup process() A. 4B. 8C. 7D. 0

Examine the output of the query that you executed to list the objects in the recycle bin:You verified that no table named SALES_TAB exists in the schema. Then you executed the following command to purge the objects in the recycle bin:SQL PURGE TABLE sales_tab;What would be the outcome of this command?()A. All three tables in the recycle bin are purgedB. Only the table with the oldest DROPSCN is purgedC. The command returns an error because multiple entries with the same name exist in the recycle binD. Only the table with the latest DROPSCN is purged

View the Exhibit to examine the error during the database startup.You open an RMAN session for the database instance. To repair the failure, you executed the following as the first command in the RMAN session:RMAN REPAIR FAILURE;Which statement describes the consequence of the command?()A. The command performs the recovery and closes the failures.B. The command only displays the advice and the RMAN script required for repair.C. The command produces an error because the ADVISE FAILURE command has not been executed before the REPAIR FAILURE command.D. The command executes the RMAN script to repair the failure and removes the entry from the Automatic Diagnostic Repository (ADR).

Your multitenant container database (CDB) is running in ARCHIVELOG mode. You connect to the CDB RMAN.Examine the following command and its output:You execute the following command:RMAN BACKUP DATABASE PLUS ARCHIVELOG;Which data files will be backed up?()A. Data files that belong to only the root containerB. Data files that belong to the root container and all the pluggable databases (PDBs)C. Data files that belong to only the root container and PDB$SEEDD. Data files that belong to the root container and all the PDBs excluding PDB$SEED

After adding a new Ethernet card to a system and rebooting, the system administrator notices the card was not configured. How can the system administrator determine if there were errors during the configuration process for the card?()A、Examine the bootlog with the command: alog -o -f /var/adm/ras/bootlogB、Display the device attributes and errors with the command: lsdev -C -l ent0C、Examine the AIX errlog for configuration method errors with the command: errpt -a -C ent0D、Examine the ODM for configuration errors with the command: odmget -q "method_errors" ent0

While applying a service update on a system using SMIT, the system administrates SMIT Command Status screen shows "Command: failed". Which of the following procedures should be performed to investigate the failure?()A、Exit the SMIT session and re-apply the update.B、Select the SMIT option to Clean UP After an Interrupted Installation.C、Examine the installation summary report to determine the cause of the failure.D、Examine the console log to view the error messages generated by the failure.

Once the filemon command is invoked, which of the following procedures should be performed to stop the command so that the filemon reports will still be generated? ()A、Run "filemon -u".B、Run the "trcstop" command.C、Perform a "kill -9" of the filemon process.D、Send a SIGSTOP signal to the filemon process.

For security reasons, an administrator is asked to modify the system to prevent someone from leaving a terminal logged in. To enable a five minute timeout for all users, what would need to be done to accomplish this task?()A、Add the following line to /etc/environment:  TMOUT=300B、Add the following lines to /.profile  TMOUT=5  export TMOUTC、Execute the following command:  chuser -u ALL -a TIMEOUT=5MD、Execute the following command:  chsec -u ALL -a TIMEOUT=600

For security reasons, an administrator is asked to modify the system to prevent someone from  leaving a terminal logged in.  Which of the following options would enable a five minute timeout for all users()A、Add the following line to /etc/environment: TMOUT=300B、Add the following lines to /.profile TMOUT=5 export TMOUTC、Run the following command: chuser -u ALL -a TIMEOUT=5MD、Run the following command: chsec -u ALL -a TIMEOUT=600

An application owner wants to grant write permission to all users for all the files and directories in the application directory. Which of the following is the correct command?()A、chmod -R u+rw /applicationB、chmod -r u+rw /applicationC、chmod -R o+rw /applicationD、chmod -r o+rw /application

Examine the following RMAN command:   RMAN CONFIGURE ENCRYPTION FOR DATABASE ON; RMAN BACKUP DATABASE PLUS ARCHIVELOG;   Which prerequisite must be met before accomplishing the backup?()A、 Provide a password for the encryptionB、 Set up an Oracle wallet for the encryptionC、 No setup is required as it is a default encryption methodD、 Both Oracle wallet and password must be set up for the encryption

Examine the following values of the initialization parameters in the database having the SID ORCL: BACKGROUND_DUMP_DEST=/u01/app/oracle/product/11.1.0/db_1/bdump USER_DUMP_DEST=/u01/app/oracle/product/11.1.0/db_1/udump CORE_DUMP_DEST=/u01/app/oracle/product/11.1.0/db_1/cdump DIAGNOSTIC_DEST= The environment variables have the following value: ORACLE_BASE=/u01/app/oracle ORACLE_HOME=/u01/app/oracle/product/11.1.0/db_1 What is the location of the Automatic Diagnostic Repository (ADR) home?()A、/u01/app/oracle/product/11.1.0/db_1B、/u01/app/oracleC、$ORACLE_HOME/bdumpD、$ORACLE_HOME/log

Your alert log file has the following information: Tue May 25 17:43:38 2004  ORA-00060: Deadlock detected. More info in file  /u01/app/oracle/admin/ORCL/udump/orcl_ora_3173.trc.  What would you do to ensure that database is still running correctly?()A、examine the trace file and kill the session that caused the deadlockB、examine the trace file and kill both the sessions responsible for the deadlockC、examine the trace file for details and ask the user who caused the deadlock to roll back the transactionD、examine the trace file for details and remember that deadlocks are resolved automatically by Oracle databaseE、examine the trace file for details and use the Undo Advisor to rollback the transaction that caused the deadlock

单选题To examine the Exhibit, press the Exhibit button. Based on the output of the "netstat -p udp" command as shown in the exhibit, which of the following procedures should be performed?()A  Increase the number of nfsd's on the client. B  Increase the number of biod's on the client. C  Decrease the number of nfsd's on the server. D  Increase the size of nfs_socketsize on the server.

多选题Examine the following command used to perform incremental level 0 backup: RMAN BACKUP INCREMENTAL LEVEL 0 DATABASE; To enable the block change tracking, after the incremental level 0 backup you issued the following command: SQL ALTER DATABASE ENABLE BLOCK CHANGE TRACKING USING FILE '/mydir/ rman_change_track.f'; To perform incremental level 1 cumulative backup, you issued the following command: RMAN BACKUP INCREMENTAL LEVEL 1 CUMULATIVE DATABASE; Which two statements are true in the above situation?()AThe block change tracking data will be used only from the next incremental 0 backup.BThe incremental backup will use change tracking data for accomplishing the backup.CThe incremental backup will not use change tracking data for accomplishing the backup.DThe block track file will scan all the blocks and create bitmap for all the blocks backed up in the level 0 backup.

单选题Once the filemon command is invoked, which of the following procedures should be performed to stop the command so that the filemon reports will still be generated? ()ARun filemon -u.BRun the trcstop command.CPerform a kill -9 of the filemon process.DSend a SIGSTOP signal to the filemon process.

单选题Examine the following RMAN command: RMAN CONFIGURE ENCRYPTION FOR DATABASE ON; RMAN BACKUP DATABASE PLUS ARCHIVELOG; Which prerequisite must be met before accomplishing the backup?()AProvide a password for the encryptionBSet up an Oracle wallet for the encryptionCNo setup is required as it is a default encryption methodDBoth Oracle wallet and password must be set up for the encryption

单选题View the Exhibit and examine the parameters. User A executes the following command to update the TRANS table: SQL UPDATE B.trans SET tr_amt=tr_amt+500 WHERE c_code=’C005’;  Before user A issues a COMMIT or ROLLBACK command, user B executes the following command onthe TRANS table:  SQL ALTER TABLE trans MODIFY (tr_type VARCHAR2(3));  What would happen in this scenario()A The ALTER TABLE command modifies the column successfully.B The DDL operation gets higher priority and transaction for user a is rolled back.C The ALTER TABLE command waits indefinitely until user a ends the transaction.D The ALTER TABLE command fails after waiting for 60 seconds due to the resource being busy.

单选题View the Exhibit and examine the output. You execute the following RMAN command to perform the backup operation:   RMAN RUN { ALLOCATE CHANNEL c1 DEVICE TYPE disk MAXOPENFILES 8; BACKUP DATABASE FILESPERSET 4; }   What is the multiplexing level in the preceding backup process?()A 4B 8C 7D 0

单选题Examine the following query output: You issue the following command to import tables into the hr schema: $ impdp hr/hr directory = dumpdir dumpfile = hr_new.dmp schemas=hr TRANSFORM=DISABLE_ARCHIVE_LOGGING: Y Which statement is true?()AAll database operations performed by the impdp command are logged.BOnly CREATE INDEX and CREATE TABLE statements generated by the import are logged.COnly CREATE TABLE and ALTER TABLE statements generated by the import are logged.DNone of the operations against the master table used by Oracle Data Pump to coordinate its activities are logged.

单选题Your multitenant container database (CDB) is running in ARCHIVELOG mode. You connect to the CDB RMAN. Examine the following command and its output: You execute the following command: RMAN BACKUP DATABASE PLUS ARCHIVELOG; Which data files will be backed up?()AData files that belong to only the root containerBData files that belong to the root container and all the pluggable databases (PDBs)CData files that belong to only the root container and PDB$SEEDDData files that belong to the root container and all the PDBs excluding PDB$SEED

单选题Examine the following command:   SQL ALTER TABLE booking SHRINK SPACE COMPACT;   Which activity is performed when the preceding command is executed?()A The shrink operation touches every block in the BOOKING tableB The high-water mark (HWM) for the BOOKING table is shifted from its original positionC The progress of the shrink operation is saved in the bitmap blocks of the BOOKING tableD The data manipulation language (DML) triggers on the BOOKING table are executed because the shrink operation is internally handled by the INSERT/DELETE operation

单选题Examine the following command:   ALTER DISKGROUP data MOUNT FORCE;   In which scenario can you use the above command to mount the disk group?()A when ASM disk goes offlineB when one or more ASM files are droppedC when some disks in a disk group are offlineD when some disks in a failure group for a disk group are rebalancing

单选题Examine the following command:ALTER SYSTEM SET enable_ddl_logging=FALSE;Which statement is true?()ANone of the data definition language (DDL) statements are logged in the trace file.BOnly DDL commands that resulted in errors are logged in the alert log file.CA new log.xml file that contains the DDL statements is created, and the DDL command details are removed from the alert log file.DOnly DDL commands that resulted in the creation of new database files are logged.

单选题Examine the following command: ALTER DISKGROUP data MOUNT FORCE; In which scenario can you use the above command to mount the disk group? ()Awhen ASM disk goes offlineBwhen one or more ASM files are droppedCwhen some disks in a disk group are offlineDwhen some disks in a failure group for a disk group are rebalancing