Question 171
Which three resources might be prioritized between competing pluggable databases when creating a multitenant container database plan (CDB plan) using Oracle Database Resource Manager? (Choose three.)
Question 172
Which three tools or tasks are run by default as part automated maintenance tasks?
(Choose three.)
(Choose three.)
Question 173
You want to create a role that:
- is protected from unauthorized usage
- does not use a password embedded in the application source code or stored in a table
- is enabled for a user based on security policies defined in a PL/SQL package How would you create this role?
- is protected from unauthorized usage
- does not use a password embedded in the application source code or stored in a table
- is enabled for a user based on security policies defined in a PL/SQL package How would you create this role?
Question 174
You want to create a role that:
- is protected from unauthorized usage
- does not use a password embedded in the application source code or stored in a table
- is enabled for a user based on security policies defined in a PL/SQL package
How would you create this role?
- is protected from unauthorized usage
- does not use a password embedded in the application source code or stored in a table
- is enabled for a user based on security policies defined in a PL/SQL package
How would you create this role?
Question 175
You perform RMAN backups for your database and use a recovery catalog for managing the backups. To free space,
you execute this command:
RMAN> DELETE OBSOLETE;
Which three statements are true is this scenario?
you execute this command:
RMAN> DELETE OBSOLETE;
Which three statements are true is this scenario?