[Free] 2018(Jan) EnsurePass Passguide Oracle 1z0-052 Dumps with VCE and PDF 111-120

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan Oracle Official New Released 1z0-052
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/1z0-052.html

Oracle Database 11g: Administration I

Question No: 111 – (Topic 2)

In a system, large online transaction processing (OLTP) jobs run during the daytime that require a large database buffer cache. In the night, the system supports batch jobs that require a higher value to be set for the large pool. You must simultaneously configure the memory components to accommodate the peak requirement.

What would you do to automate this configuration for the memory components with change in mode of working?

  1. Set the SGA_TARGET initialization parameter to zero.

  2. Set the PRE_PAGE_SGA initialization parameter to TRUE.

  3. Set the MEMORY_MAX_TARGET initialization parameter to zero.

  4. Set the SGA_TARGET initialization parameter to a nonzero value.

    Answer: D

    Question No: 112 – (Topic 2)

    Given below is a list of scenarios:

    1. A user terminates his session abnormally.

    2. The connection between the server and the client application terminates because of a network failure.

    3. A schema is accidentally dropped.

    4. The tablespace is accidentally dropped from the database.

    5. The hard disk gets corrupted and the data files in the disk are lost.

    6. The database instance abnormally shuts down because of power failure. Which scenarios require DBA intervention to perform recovery?

      1. 1, 3, and 6

      2. 4, 5, and 6

      3. 3, 4, and 5

      4. 1, 2, and 6

Answer: C

Question No: 113 – (Topic 2)

View the Exhibit and examine the undo tablespace attributes. Your database instance is experiencing a large volume of transactions from non-DBA users in the last one hour. The undo tablespace NDOTBS1 is full with transactions and no transaction was committed more than one hour ago. The database has two more undo tablespaces.

What happens to the new DML operations in this scenario? Exhibit:

Ensurepass 2018 PDF and VCE

  1. The DML commands will fail

  2. The undo data generated by the DML is stored in one of the two other undo tablespace

  3. The undo data generated by the DML will overwrite the extents that contain committed undo data

  4. The undo data generated by the DML is stored in the SYSTEM undo segment of the SYSTEM tablespace

Answer: A Explanation:

Tablespaces in the Preconfigured Database (continued)

  • TEMP: Your temporary tablespace is used when you execute a SQL statement that requires the creation of temporary segments (such as a large sort or the creation of an index). Just as each user is assigned a default tablespace for storing created data objects, each user is assigned a temporary tablespace. The best practice is to define a default temporary tablespace for the database, which is assigned to all newly created users unless otherwise specified. In the preconfigured database, the TEMP tablespace is specified as the default temporary tablespace. This means that if no temporary tablespace is specified when the user account is created. Oracle Database assigns this tablespace to the user.

  • UNDOTBS1: This is the undo tablespace used by the database server to store undo information. If a database uses Automatic Undo Management, it must have exactly one active undo tablespace per instance at any given time. This tablespace is created at database creation time.

  • USERS: This tablespace is used to store permanent user objects and data. In the preconfigured database, the USERS tablespace is the default tablespace for all objects created by nonsystem users. For the SYS and SYSTEM users (the system users), the default permanent tablespace remains SYSTEM.

  • EXAMPLE: This tablespace contains the sample schema* that can be installed when you create the database. The sample schemas provide a common platform for examples. Oracle documentation and courseware contain examples based on the sample schemas.

    Note: To simplify administration, it is common to have a tablespace for indexes alone.

    Question No: 114 – (Topic 2)

    database, DEVDB, to the production database, PRODDB. A database link devdb.us.oracle.com is created between PRODDB and DEVDB. You execute the following command on the PRODDB database server:

    $ impdp system/manager directory = DB_DATA dumpfile = schemas.dat

    schemas = hr

    flashback_time = quot;TO_TIMESTAMP(#39;25-08-2007 14:35:00#39;, #39;DD-MM-YYYY HH24:MI:SS#39;)quot;

    The command fails displaying the following error: ORA-39001: invalid argument value

    ORA-39000: bad dump file specification

    ORA-31640: unable to open dump file quot;/home/oracle/schema/schemas.datquot; for read ORA- 27037: unable to obtain file status

    What would you do to overcome the error?

    1. Add the user, SYSTEM, to the schemas option.

    2. Add the network_link = devdb.us.oracle.com option.

    3. Change the dumpfile option to schema.dat@devdb.us.oracle.com.

    4. Replace the schemas option with the network_link = devdb.us.oracle.com

    5. Replace the dumpfile option with the network_link = devdb.us.oracle.com

    Answer: E Explanation:

    The Data Pump import command, impdp, can now use this database link to directly access remote data. The command line parameter NETWORK_LINK points to the source database via its database link.

    When you use the network_link parameter, you directly import from the remote database. There is no export made, and directories are not used.

    Question No: 115 – (Topic 2)

    Which task would you perform before you run Oracle Universal Installer (OUI) in silent or suppressed mode for an installation?

    1. Run the root.sh script.

    2. Create the oraInst.loc file.

    3. Create the tnsnames.ora file.

    4. Run the oraInstRoot.sh script.

      Answer: B

      Question No: 116 – (Topic 2)

      You want to create a role to meet these requirements:

      1. The role is to be protected from unauthorized usage.

      2. The password of the role is not to be embedded in the application source code or stored in a table.

        Which method would you use to restrict enabling of such roles?

        1. Create the role with external authentication.

        2. Create the role as a secure application role.

        3. Create the role as a password-protected role.

        4. Create a role and use Fine-Grained Access Control (FGAC) to secure the role.

    Answer: B

    Question No: 117 – (Topic 2)

    Which two statements are true regarding listeners? (Choose two.)

    1. Listeners use only the TCP/IP protocol.

    2. Multiple listener processes can run simultaneously on a host.

    3. Multiple database instances can be registered with a single listener.

    4. The listener-related errors can be traced only at the administrative level.

    5. Only one database instance can be registered with a single listener at any time.

    Answer: B,C

    Question No: 118 – (Topic 2)

    Which two statements are true about the Automatic Database Diagnostic Monitor (ADDM)? (Choose two.)

    1. The ADDM requires at least four AWR snapshots for analysis

    2. The ADDM runs after each AWR snapshot is collected automatically by MMON

    3. The results of the ADDM analysis are stored in the Automatic Workload Repository (AWR)

    4. The ADDM analysis provides only diagnostics information but does not provide recommendations

    5. The ADDM calls other advisors if required, but does not provide recommendations about the advisors

    Answer: B,C

    Question No: 119 – (Topic 2)

    Which statement is true about the Manageability Monitor (MMON) background process?

    1. It transfers statistics from memory to disk at regular intervals.

    2. It coordinates the rebalance activity for disk groups when ASM is used.

    3. It communicates with the Automatic Storage Management (ASM) instance on behalf of the database instance.

    4. It performs dynamic memory management when Automatic Shared Memory Management is enabled for the database instance.

    Answer: A Explanation:

    Other Processes

    There are several other background processes that might be running. These can include the following:

    The Manageability Monitor process (MMON) performs various manageability-related background tasks, for example:

    • Issuing alerts whenever a given metrics violates its threshold value

    • Taking snapshots by spawning additional process (MMOX slaves)

    • Capturing statistics value for SQL objects that have been recently modified

    The Lightweight Manageability Monitor process (MMXL) performs frequent tasks related to lightweight manageability, such as session history capture and metrics computation.

    The Memory Manager process (MMAN) is used for internal database tasks. It manages automatic memory management processing to help allocate memory where it is needed dynamically in an effort to avoid out-of-memory conditions or poor buffer cache performance.

    Question No: 120 – (Topic 2)

    You have a large amount of historical data in a flat file. Some analysts in your organization need to query this data in the file. The file is too large to load the data in it into your current database.

    Which is the most effective method to access this data in your database?

    1. Use the database link.

    2. Use the SQL*Loader utility.

    3. Use the Oracle Data Pump utility.

    4. Create an external table and leave the data in the flat file.

    Answer: D

    100% Ensurepass Free Download!
    Download Free Demo:1z0-052 Demo PDF
    100% Ensurepass Free Guaranteed!
    1z0-052 Dumps

    EnsurePass ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No

  • Leave a Reply

    Your email address will not be published. Required fields are marked *