[Free] 2018(Jan) EnsurePass Passguide Oracle 1z0-060 Dumps with VCE and PDF 11-20

2018 Jan Oracle Official New Released 1z0-060
100% Free Download! 100% Pass Guaranteed!

Upgrade to Oracle Database 12c

Question No: 11

Identify two situations in which the alert log file is updated.

  1. Running a query on a table returns ORA-600: Internal Error.

  2. Inserting a value into a table returns ORA-01722: invalid number.

  3. Creating a table returns ORA-00955: name us already in used by an existing objects.

  4. Inserting a value into a table returns ORA-00001: unique constraint (SYS.OK_TECHP) violated.

  5. Rebuilding an index using ALTER INDEX . . . REBUILD fails with an ORA-01578: ORACLE data block corrupted (file # 14, block # 50) error.

Answer: A,E

Explanation: The alert log is a chronological log of messages and errors, and includes the following items:

*All internal errors (ORA-600), block corruption errors (ORA-1578), and deadlock errors

(ORA-60) that occur

  • Administrative operations, such as CREATE, ALTER, and DROP statements and STARTUP, SHUTDOWN, and ARCHIVELOG statements

  • Messages and errors relating to the functions of shared server and dispatcher processes

  • Errors occurring during the automatic refresh of a materialized view

  • The values of all initialization parameters that had nondefault values at the time the database and instance start


  • The alert log file (also referred to as the ALERT.LOG) is a chronological log of messages and errors written out by an Oracle Database. Typical messages found in this file is: database startup, shutdown, log switches, space errors, etc. This file should constantly be monitored to detect unexpected messages and corruptions.

Question No: 12

You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.

You issue the following statements:


For which database users is the audit policy now active?

  1. All users except SYS

  2. All users except SCOTT

  3. All users except sys and SCOTT

  4. All users except sys, system, and SCOTT

Answer: B

Explanation: If you run multiple AUDIT statements on the same unified audit policy but specify different EXCEPT users, then Oracle Database uses the last exception user list, not any of the users from the preceding lists. This means the effect of the earlier AUDIT POLICY … EXCEPT statements are overridden by the latest AUDIT POLICY … EXCEPT statement.


  • The ORA_DATABASE_PARAMETER policy audits commonly used Oracle Database parameter settings. By default, this policy is not enabled.

  • You can use the keyword ALL to audit all actions. The following example shows how to audit all actions on the HR.EMPLOYEES table, except actions by user pmulligan.

    Example Auditing All Actions on a Table


    AUDIT POLICY all_actions_on_hr_emp_pol EXCEPT pmulligan;

    Reference: Oracle Database Security Guide 12c, About Enabling Unified Audit Policies

    Question No: 13

    Which three resources might be prioritized between competing pluggable databases when creating a multitenant container database plan (CDB plan) using Oracle Database Resource Manager?

    1. Maximum Undo per consumer group

    2. Maximum Idle time

    3. Parallel server limit

    4. CPU

    5. Exadata I/O

    6. Local file system I/O

    Answer: C,D,E

    Explanation: http://docs.oracle.com/database/121/ADMIN/dbrm.htm#ADMIN11852

    Question No: 14

    You executed this command to create a password file:

    $ orapwd file = orapworcl entries = 10 ignorecase = N Which two statements are true about the password file?

    1. It will permit the use of uppercase passwords for database users who have been granted the SYSOPER role.

    2. It contains username and passwords of database users who are members of the OSOPER operating system group.

    3. It contains usernames and passwords of database users who are members of the OSDBA operating system group.

    4. It will permit the use of lowercase passwords for database users who have granted the SYSDBA role.

    5. It will not permit the use of mixed case passwords for the database users who have been granted the SYSDBA role.

    Answer: A,D

    Explanation: * You can create a password file using the password file creation utility, ORAPWD.

  • Adding Users to a Password File

    When you grant SYSDBA or SYSOPER privileges to a user, that user#39;s name and privilege information are added to the password file. If the server does not have an EXCLUSIVE password file (that is, if the initialization parameter REMOTE_LOGIN_PASSWORDFILE is NONE or SHARED, or the password file is missing), Oracle Database issues an error if you attempt to grant these privileges.

    A user#39;s name remains in the password file only as long as that user has at least one of these two privileges. If you revoke both of these privileges, Oracle Database removes the user from the password file.

  • The syntax of the ORAPWD command is as follows:

    ORAPWD FILE=filename [ENTRIES=numusers] [FORCE={Y|N}] [IGNORECASE={Y|N}] [NOSYSDBA={Y|N}]


If this argument is set to y, passwords are case-insensitive. That is, case is ignored when comparing the password that the user supplies during login with the password in the password file.

Question No: 15

You created an encrypted tablespace:

Ensurepass 2018 PDF and VCE

You then closed the encryption wallet because you were advised that this is secure.

Later in the day, you attempt to create the EMPLOYEES table in the SECURESPACE tablespace with the SALT option on the EMPLOYEE column.

Which is true about the result?

  1. It creates the table successfully but does not encrypt any inserted data in the EMPNAME column because the wallet must be opened to encrypt columns with SALT.

  2. It generates an error when creating the table because the wallet is closed.

  3. It creates the table successfully, and encrypts any inserted data in the EMPNAME column because the wallet needs to be open only for tablespace creation.

  4. It generates error when creating the table, because the salt option cannot be used with encrypted tablespaces.

Answer: B

Question No: 16

In your multitenant container database (CDB) containing pluggable database (PDBs), the HR user executes the following commands to create and grant privileges on a procedure:

CREATE OR REPLACE PROCEDURE create_test_v (v_emp_id NUMBER, v_ename


INSERT INTO hr.test VALUES (V_emp_id, V_ename, V_salary, V_dept_id); END;


GRANT EXECUTE ON CREATE_TEST TO john, jim, smith, king;

How can you prevent users having the EXECUTE privilege on the CREATE_TEST procedure from inserting values into tables on which they do not have any privileges?

  1. Create the CREATE_TEST procedure with definer’s rights.

  2. Grant the EXECUTE privilege to users with GRANT OPTION on the CREATE_TEST procedure.

  3. Create the CREATE_TEST procedure with invoker’s rights.

  4. Create the CREATE_TEST procedure as part of a package and grant users the EXECUTE privilege the package.

Answer: C

Explanation: If a program unit does not need to be executed with the escalated privileges of the definer, you should specify that the program unit executes with the privileges of the caller, also known as the invoker. Invoker#39;s rights can mitigate the risk of SQL injection.


Not A: By default, stored procedures and SQL methods execute with the privileges of their owner, not their current user. Such definer-rights subprograms are bound to the schema in which they reside.

not B: Using the GRANT option, a user can grant an Object privilege to another user or to PUBLIC.

Question No: 17

Which three features work together, to allow a SQL statement to have different cursors for the same statement based on different selectivity ranges?

  1. Bind Variable Peeking

  2. SQL Plan Baselines

  3. Adaptive Cursor Sharing

  4. Bind variable used in a SQL statement

  5. Literals in a SQL statement

Answer: A,C,E

Explanation: * In bind variable peeking (also known as bind peeking), the optimizer looks at the value in a bind variable when the database performs a hard parse of a statement.

When a query uses literals, the optimizer can use the literal values to find the best plan. However, when a query uses bind variables, the optimizer must select the best plan without the presence of literals in the SQL text. This task can be extremely difficult. By peeking at bind values the optimizer can determine the selectivity of a WHERE clause condition as if literals had been used, thereby improving the plan.

C: Oracle 11g/12g uses Adaptive Cursor Sharing to solve this problem by allowing the server to compare the effectiveness of execution plans between executions with different bind variable values. If it notices suboptimal plans, it allows certain bind variable values, or ranges of values, to use alternate execution plans for the same statement. This functionality requires no additional configuration.

Question No: 18

Examine the commands executed to monitor database operations:

$gt; conn sys oracle/oracle@prod as sysdba SQL gt; VAR eid NUMBER


Which two statements are true?

  1. Database operations will be monitored only when they consume a significant amount of resource.

  2. Database operations for all sessions will be monitored.

  3. Database operations will be monitored only if the STATISTICS_LEVEL parameter is set


  4. Only DML and DDL statements will be monitored for the session.

  5. All subsequent statements in the session will be treated as one database operation and will be monitored.

Answer: C,E

Explanation: C: Setting the CONTROL_MANAGEMENT_PACK_ACCESS initialization parameter to DIAGNOSTIC TUNING (default) enables monitoring of database operations. Real-Time SQL Monitoring is a feature of the Oracle Database Tuning Pack.


* The DBMS_SQL_MONITOR package provides information about Real-time SQL Monitoring and Real-time Database Operation Monitoring.

*(not B) BEGIN_OPERATION Function

starts a composite database operation in the current session.

/ (E) FORCE_TRACKING – forces the composite database operation to be tracked when the operation starts. You can also use the string variable #39;Y#39;.

/ (not A) NO_FORCE_TRACKING – the operation will be tracked only when it has consumed at least 5 seconds of CPU or I/O time. You can also use the string variable #39;N#39;.

Question No: 19

Which three tasks can be automatically performed by the Automatic Data Optimization feature of Information lifecycle Management (ILM)?

  1. Tracking the most recent read time for a table segment in a user tablespace

  2. Tracking the most recent write time for a table segment in a user tablespace

  3. Tracking insert time by row for table rows

  4. Tracking the most recent write time for a table block

  5. Tracking the most recent read time for a table segment in the SYSAUX tablespace

  6. Tracking the most recent write time for a table segment in the SYSAUX tablespace

Answer: A,B,D Explanation: Incorrect:

Not E, Not F When Heat Map is enabled, all accesses are tracked by the in-memory

activity tracking module. Objects in the SYSTEM and SYSAUX tablespaces are not tracked.

  • To implement your ILM strategy, you can use Heat Map in Oracle Database to track data access and modification.

    Heat Map provides data access tracking at the segment-level and data modification tracking at the segment and row level.

  • To implement your ILM strategy, you can use Heat Map in Oracle Database to track data access and modification. You can also use Automatic Data Optimization (ADO) to automate the compression and movement of data between different tiers of storage within the database.

Reference: Automatic Data Optimization with Oracle Database 12c with Oracle Database 12c

Question No: 20

Examine the following commands for redefining a table with Virtual Private Database (VPD) policies:

Ensurepass 2018 PDF and VCE

Which two statements are true about redefining the table?

  1. All the triggers for the table are disabled without changing any of the column names or column types in the table.

  2. The primary key constraint on the EMPLOYEES table is disabled during redefinition.

  3. VPD policies are copied from the original table to the new table during online redefinition.

  4. You must copy the VPD policies manually from the original table to the new table during online redefinition.

Answer: A,C

Explanation: The triggers cloned to the interim table are disabled until the redefinition is completed. Once the redefinition is complete, all cloned objects are renamed to the original names used by they objects they were cloned from.

Ref: http://www.oracle-base.com/articles/10g/online-table-redefinition-enhancements- 10gr1.php

100% Free Download!
Download Free Demo:1z0-060 Demo PDF
100% Pass Guaranteed!
Download 2018 EnsurePass 1z0-060 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2018 EnsurePass IT Certification PDF and VCE

Leave a Comment


Your email address will not be published. Required fields are marked *